Where The Next Trump Hit Will Come From - Comey's Haqqani Network
Will Comey Use The Haqqani Network To Kill Trump While He Is In UAE?
James Comey just put a death threat on President Donald Trump. We analyze the threat matrix in this article on how Comey might get that done in order to thwart that attempt.
If Comey still has his Blackberry, the easiest way to order a hit on Trump would be through the Clinton Network or the Haqqani Network in UAE where Trump is now.
Our research group has also shown that the 9/11 planning group, PTECH, used the Haqqani Network to execute 9/11. With 8647 being the exact number of days between Comey’s Haqqani Network 9/11 and Ambassador Haqqani being in UAE at the same time as President Trump, we had to act. We did a whole series on the Haqqani Network and PTECH.
Cracking 9/11 - Part One - Follow The Comms
Last night, I participated in a two-hour review of the latest research on 9/11 with several experts, including Jason Bermas, who has been studying the 9/11 event for more than twenty years.
Comey definitely still might have the encrypted Blackberry, and Ambassador Haqqani certainly has his.
We followed Haqqani and Pak ISI Intelligence Service ordering the Mumbai Bombings in 2008 through the terrorist network of Dawood Ibrahim. Haqqani also ordered the Jihadist overthrow of Pakistan after President Obama took out Osama Bin Laden in Pakistan.
Pakistani General Pasha presented evidence of Haqqani’s Blackberry exchange to Admiral Mike Mullen to prove Haqqani ties and communications with the CIA and intelligence agencies. There were possible diversions of arms intended for the Afghanistan Wars through the US Congress which diverted arms by the Imran Awan Spy Ring.
Top expert William Riedel says Pakistani ISI and the Pakistani terrorist organizations are one and the same, giving Comey access to a sophisticated assassination network.
Possible diversion of weapons sales intended for the Afghanistan War by Jeff Epstein should also be explored for his Blackberry communications on the ellmax.com Blackberry server.
Ellmax.com Email Address Report
This report consolidates publicly-documented email addresses associated with the private domain ellmax.com, which operated as a BlackBerry Enterprise Server (BES) for Ghislaine Maxwell and, possibly, Jeffrey Epstein. Available
records show that ellmax.com was used by Maxwell primarily, with no verified evidence of Jeffrey Epstein using a personal email address on this domain.
The address gmax1@ellmax.com was Ghislaine Maxwell's primary BlackBerry email. This address appears in multiple unsealed court exhibits from January 2015, where Epstein is shown coaching Maxwell on how to issue a media
statement. The emails are authenticated and preserved in multiple court filings and press reports. Some OCR software
misread this address as gmaxl@ellmax.com due to the similar appearance of the numeral '1' and the lowercase letter 'l'.
A secondary address, gmax@ellmax.com, is mentioned in media summaries but does not appear directly in redacted PDFs. It may have served as a shorthand or alias that forwarded messages to the primary gmax1 account.
An administrative contact in WHOIS records, jennifer@ellmax.com (also referred to as jturner@ellmax.com), is believed to be an alias of Ghislaine Maxwell under the name Jennifer Turner. This name appeared in Reddit investigations and
WHOIS domain records as early as 2013, but no message content from this address has been publicly released.
A letter from Boies Schiller lawyers dated June 20, 2016, instructed forensic consultants to collect messages from Maxwell's various devices, specifically naming the ellmax.com domain. The instruction referenced other unidentified accounts at ellmax.com, though none of these have been unsealed in court filings.
Despite wide speculation, there is no credible or documented evidence that Jeffrey Epstein used an ellmax.com email address. The two known email addresses used by Epstein in unsealed communications are jeff@jeffreyepstein.com and je@jeffreyepstein.org. No version of JE@ellmax.com appears in court filings, DOJ exhibits, or correspondence logs.
There is a good chance that the same networks used to divert Afghanistan weapons would also be used in a State sponsored assassination of President Donald Trump.
Jeffrey Epstein Communication Devices & Metadata Report
I. Overview: Jeffrey Epstein relied on several overlapping layers of communication, ranging from traditional land-line
telephones and desktop computers to encrypted mobile devices and in-flight satellite systems. Examining those
channels explains why the underlying metadata has remained fragmentary.
II. Property land-lines: Staff at the Palm Beach mansion kept old-fashioned pink message pads that logged hundreds of
calls between 2002 and 2005. Palm Beach police seized the notebooks in a 2005 raid, and the slips later appeared in
civil litigation and the Maxwell criminal case.
III. Desktop computers and servers: Both the 2005 Palm Beach raid and the July 2019 FBI search of the Manhattan
townhouse documented racks of PCs and external hard drives that held e-mail, surveillance video, and contact archives.
Because the first 2019 warrant did not cover digital media, many drives were removed before agents returned with an
expanded warrant, complicating chain-of-custody.
IV. Mobile phones and **BlackBerry** devices: Witnesses and unsealed exhibits describe Epstein traveling with
multiple cell phones and using **BlackBerry-formatted** addresses-- notably the private ellmax.com server that
Ghislaine Maxwell used for e-mails marked JE. Although SIM-card references appear in court filings, no physical
handsets or carrier Call Detail Records have surfaced in public evidence logs.
V. Satellite and aircraft communications: Pilots testified that Epsteins Gulfstream and Boeing 727 were equipped with
SatCom phones and airborne e-mail. Such systems store call logs with the provider rather than on the aircraft itself; those billing archives were subpoenaed, but the metadata has never been made public.
VI. Why the metadata trail is thin:
1. Retention windows closed - cellular carriers typically keep tower and text logs only one to five years; by 2018 most grooming-period records had already expired.
2. Search-warrant scope and timing - the initial 2019 Manhattan warrant covered financial documents, not digital media, allowing removal of drives before agents returned.
3. The 2008 Non-Prosecution Agreement - because it barred federal charges for the underlying conduct, prosecutors hesitated to create a new evidentiary record that might clash with the NPA.
4. Evidence already missing or altered - detectives in both 2005 and 2019 found computer cables dangling where hard drives had been hastily removed.
5. Intelligence-community equities - several visitors arrived carrying State-Department-issued **BlackBerry** handsets and Epstein reportedly mandated an encrypted **BlackBerry Enterprise Server (BES)**; if logs exist inside government archives they may be shielded by national-security privilege.
6. Ongoing related cases - SDNY and the Virgin Islands civil suit still hold much of the digital evidence under seal until cooperating witnesses testify.
VII. Could the metadata still be recovered? Carrier CDRs from the last five years, SatCom billing logs, provider-hosted **BlackBerry** server archives, and forensic images of the drives seized in 2019 may still exist, but each source faces legal hurdles such as subpoenas, mutual-legal-assistance requests, encryption keys, or sealing orders.
VIII. Bottom line: Epsteins communications architecture--land-line message pads, networked drives, multiple cell phones, and encrypted **BlackBerry** channels--left a patchwork metadata trail. Narrow warrants, expired retention windows, the 2008 NPA, deliberate evidence removal, and probable intelligence sensitivities together explain why investigators and the public have yet to see a comprehensive call-and-e-mail log.
The old fashioned pink message
telephone pads did not have a copy?? There was a type of book message pads that left a carbon copy that was more of a pale yellow color.
Comey is long dead. But I guess he lives on in the Matrix.